Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Gu-Hsin Lai"'
Publikováno v:
IEEE Access, Vol 8, Pp 199840-199851 (2020)
Mobile and IoT devices are blooming, and their applications are prevailing worldwide. In the meantime, the Industry 4.0 trend converges industrial control systems with the internet environment, which makes it vulnerable. Mobile and IoT applications p
Externí odkaz:
https://doaj.org/article/02849f41508440c49a2c8364d9fd298b
Autor:
Gu-Hsin Lai, 賴谷鑫
97
The spread of spam mails have become a serious threat in the Internet. In addition to commercial messages, some malicious messages such as phishing, pornography messages, fraudulent messages and malicious codes are spread via spam. A practica
The spread of spam mails have become a serious threat in the Internet. In addition to commercial messages, some malicious messages such as phishing, pornography messages, fraudulent messages and malicious codes are spread via spam. A practica
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/a3tmeu
Publikováno v:
IEEE Access, Vol 8, Pp 199840-199851 (2020)
Mobile and IoT devices are blooming, and their applications are prevailing worldwide. In the meantime, the Industry 4.0 trend converges industrial control systems with the internet environment, which makes it vulnerable. Mobile and IoT applications p
Publikováno v:
Computer Science & Information Technology (CS & IT).
The “Industry 4.0” revolution and Industry Internet of Things (IIoT) has dramatically transformed how manufacturing and industrial companies operate. Industrial control systems (ICS) process critical function, and the past ICS attacks have caused
Publikováno v:
AsiaJCIS
Access Point is challenging as WiFi security is often abused. Most access points are open to the public and might be targeted by hackers. One of the most popular hacking strategies to take control of the passwords that are easy to do with GPU. This e
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030394448
Advanced Persistent Threat (APT) attacks are notorious in businesses and organizations, performed by highly organized, well-funded hacker groups against specific targets. Attackers employ advanced and customized attack tactics to invade target system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc87d4b1785b2521e84be6fdf91408fc
https://doi.org/10.1007/978-3-030-39445-5_56
https://doi.org/10.1007/978-3-030-39445-5_56
Publikováno v:
The Journal of Supercomputing. 76:1468-1481
The security threats related to personally identifiable information are increasing dramatically. In addition to government agencies, large international companies are potential victims. To comply with regulations such as the European Union General Da
Publikováno v:
International Journal of Computer and Electrical Engineering. 10:241-247
Publikováno v:
iCAST
Workload of cybersecurity administrators has significantly increased with the proliferation of the internet and the accompanied cyberattacks. In order to help firms to identify most recent and emerging cyberattacks in a timely manner, this research a
Publikováno v:
iCAST
Web of Science
Web of Science
Failure to detect malware at its very inception leaves room for it to post significant threat and cost to cyber security for not only individuals, organizations but also the society and nation. However, the rapid growth in volume and diversity of mal